Huntress Blog

Welcome to the Huntress Cybersecurity Blog, your go-to spot for staying ahead of hackers and boosting your cybersecurity savviness. Our blog contributors have focused on making cybersecurity education engaging and accessible for everyone.

AMOS Stealer Exploits AI Trust: Malware Delivered Through ChatGPT and Grok

Dec 9, 2025
Categories [1]
Down arrow
Search
The Great VM Escape: ESXi Exploitation in the Wild

The Great VM Escape: ESXi Exploitation in the Wild

Active Exploitation of Gladinet CentreStack/Triofox Insecure Cryptography Vulnerability

Active Exploitation of Gladinet CentreStack/Triofox Insecure Cryptography Vulnerability

December 18, 2025
AMOS Stealer Exploits AI Trust: Malware Delivered Through ChatGPT and Grok

AMOS Stealer Exploits AI Trust: Malware Delivered Through ChatGPT and Grok

ClickFix Gets Creative: Malware Buried in Images

ClickFix Gets Creative: Malware Buried in Images

November 24, 2025
Gootloader Returns: What Goodies Did They Bring?

Gootloader Returns: What Goodies Did They Bring?

November 5, 2025
The Crown Prince, Nezha: A New Tool Favored by China-Nexus Threat Actors

The Crown Prince, Nezha: A New Tool Favored by China-Nexus Threat Actors

Huntress Threat Advisory: Widespread SonicWall SSLVPN Compromise

Huntress Threat Advisory: Widespread SonicWall SSLVPN Compromise

October 10, 2025
Don’t Sweat the *Fix Techniques

Don’t Sweat the *Fix Techniques

September 29, 2025
From Custom Scripts to Commodity RATs: A Threat Actor’s Evolution to PureRAT

From Custom Scripts to Commodity RATs: A Threat Actor’s Evolution to PureRAT

September 25, 2025
Huntress Threat Advisory: The Dangers of Storing Unencrypted Passwords

Huntress Threat Advisory: The Dangers of Storing Unencrypted Passwords

September 15, 2025
How an Attacker’s Blunder Gave Us a Rare Look Inside Their Day-to-Day Operations

How an Attacker’s Blunder Gave Us a Rare Look Inside Their Day-to-Day Operations